Read the TechNews Online at: http://technews.acm.org
ACM TechNews
April 14, 2006

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the April 14, 2006 edition of ACM TechNews, providing timely information for IT professionals three times a week.

Sponsored by
Learn more about Texis, the text-oriented database 
providing high-performance search engine features combined with SQL 
operations and a development toolkit, that powers many diverse 
applications, including Webinator and the Thunderstone Search Appliance.
Learn more about Texis, the text-oriented database providing high-performance search engine features combined with SQL operations and a development toolkit, that powers many diverse applications, including Webinator and the Thunderstone Search Appliance.


HEADLINES AT A GLANCE:

 

Software Engineers Top List of Best Jobs
Reuters (04/13/06) Wulfhorst, Ellen

Money magazine named software engineering the best job area in the country, based on healthy growth prospects, room for creativity, and average compensation of $80,500. The occupational survey, conducted by Money and Salary.com, found that college professors have the second-best job in the country, with an average work week of 30 hours and the most annual vacations days at 31. Money weighted the factors of job growth and income along with softer measures such as flexibility and stress. "People were really looking for more flexibility and less stress," said Craig Matters, executive editor of Money. "That just got pounded into our heads." The top contributing factors to stress were work overload, lack of advancement, and deadlines. Almost a third of the top 50 jobs were in the technology and health care industries.
Click Here to View Full Article
to the top


ACM President Sees Need for Policies That Attract Students to Technology
PRNewswire (04/13/06)

The results of this week's Association for Computing Machinery (ACM) International Collegiate Programming Contest (ICPC) suggest that top U.S. programming students are struggling to compete with students from foreign universities, according to ACM President David Patterson. The top five entries included two teams from Russia, one from the Netherlands, one from China, and one from Poland. The top U.S. school was MIT, which finished No. 7; Princeton University and DePaul University finished Nos. 28 and 29, respectively. "On the 30th anniversary of ACM's association with this international competition, the results show that educational policy and R&D investment are more important than ever for countries to stay competitive," Patterson said. To remain competitive, the United States must do a better job of training its teachers and developing computer-science curricula, as well as increasing funding for basic research, Patterson argued. He also criticized the notion that globalization and economic pressures are sending U.S. tech jobs overseas, citing the recent ACM study, "Globalization and Offshoring of Software," (available at http://www.acm.org/globalizationreport/) which concluded that such misimpressions undermine student interest in technology and argued for policies that drive innovation and attract top talent. Patterson also said there are more tech jobs available today than at the peak of the dot-com boom, despite the increase in offshoring.
Click Here to View Full Article
to the top


A Cyber Infrastructure Network for Europe
Innovations Report (04/13/06)

The European Science Foundation is launching the Forward Look program to coordinate and advance the efforts of Europe's computing professionals. The program will help Europe stay at the cutting edge of technologies such as atomic-scale materials simulation as the volume of tools, code, and hardware continues to grow. Keeping up with new applications and ensuring that they are compatible with existing systems occupies an increasing amount of scientists' time. "We need to raise awareness that this field is changing and that there is a need for this infrastructure to be put into place," said Berend Smit, the chief scientist who proposed the program. Forward Look will be a coordinated effort to guide the efforts of European researchers, similarly to the U.S. cyber infrastructure where researchers have numerous support services at their fingertips. The program could also lead to an integrated collaborative platform where programmers could share code. "If this infrastructure is successfully developed, we should see future scientific advances, which would not be possible in the current climate," Smit said.
Click Here to View Full Article
to the top


Video Sensor Network Laboratory at UCR Receives Federal Funding
CCNews (04/11/06)

Researchers at the University of California, Riverside, are using a two-year, $250,500 grant from the National Science Foundation to develop a sophisticated wireless video network that is able to collect images, analyze images for problems or threats, and warn users. Electrical engineering professor Bir Bhanu and colleagues who are experts in computer vision, machine learning, image processing, pattern recognition and data mining, communication and control, network security, and database and artificial intelligence will build the Outdoor Video Sensor Network Laboratory facility, or Video Web. "There is no technology available to detect and recognize people, vehicles or objects that could pose problems in the environment of large distributed wireless network of video sensors," says Bhanu. "Or to control and manage animals in wilderness parks or large farms using not only the non-imaging sensors but also the network of videos." Video Web will make use of 80 pan-tilt zoom video cameras, each connected to a computational unit to handle processing at the camera site. The computational unit will be able to compress data and identify objects and activity, and researchers will be able to access the video cameras over a network using IP addresses. Acoustic, seismic, and vibration sensors will serve as the system's triggers.
Click Here to View Full Article
to the top


Nanocars Get Their Motors Running
CNet (04/12/06) Kanellos, Michael

Researchers at Rice University have developed nanocars, complex molecules that contain moving parts and have the ability to traverse a surface while receiving steering directions from electrical or magnetic fields. The molecular cars roll on structures similar to wheels that are connected to an axle, despite measuring only a few nanometers in length. They receive propulsion from an electrical charge that is applied to the roadway, which is a thin layer of gold. A motor is attached that begins driving the car forward once light reaches its paddlewheel. Researchers hope that the nanocars will be used as helping agents in the chemical reactions that could build next-generation microprocessors or other electronics components. For example, a nanocar could complete a circuit by shuttling the loose end of a carbon nanotube to a point where it can connect.
Click Here to View Full Article
to the top


Promising Employment News for Techies
eWeek (04/11/06) Rothberg, Deborah

A recent study has found that job cuts in the technology sector have hit a low point not seen since the period following the end of the recession. "Job cuts are really down significantly from where they were a year ago," said John Challenger, CEO of Challenger, Grey & Christmas, the consulting firm that authored the report. In the first quarter, tech-industry job cuts fell almost 34 percent to 39,379, down from 59,537 a year earlier, marking the fourth consecutive quarter during which job cuts fell from their previous-year mark. Companies will continue to increase spending thanks to strong 2005 profits, Challenger said, noting that some companies will be reinvesting in their technology for the first time since the recession. Telecommunications workers bore the brunt of the job cuts, accounting for 23,791 of the 39,379 positions lost in the first quarter. The computing industry saw 10,711 jobs eliminated, and the electronics industry posted cuts of 4,738. With just 139 jobs cut, e-commerce was the least-affected sector. Even with 43 percent of the cuts stemming from mergers, Challenger argued that that figure belies a healthy economy. "The cuts that we're seeing in telecom aren't because companies are doing poorly, it's actually occurring because companies are buying up others and consolidating," he said. "In times when the economy is good, mergers and acquisitions grow, and companies consolidate. Downtimes are less, and people move into better jobs sooner. It may even serve to redistribute people to where the growth is." With the national unemployment rate hitting a three-year low, companies are working more actively to retain the employees they have. So far this year, tech sector job cuts account for 15.4 percent of all job cuts, compared with 16.3 percent last year, according to the report. The percentage of overall job cuts accounted for by tech jobs has declined each of the last five years.
Click Here to View Full Article
to the top


Troops Learn to Not Offend
Wired News (04/11/06) Cuda, Gretchen

The U.S. military is using a new video game to educate soldiers about the cultural significance of gestures and other means of unspoken communication that could help them avoid inadvertently offending people in Iraq. Unlike previous interactive language programs that focus only on spoken language, Tactical Iraqi teaches players the cultural significance of gestures, actions that are considered taboo, and a set of basic Arabic phrases. A speech-recognition system records and analyzes the responses of the players as they interact with each other. Players advance by giving accurate responses and building a rapport with other characters. The Army and Marine Corps have already trained around 300 soldiers with the program, and it will have been used to train thousands of soldiers by the end of the year, according to Lewis Johnson of the University of Southern California's Information Sciences Institute, the facility where the program was developed. Soldiers can either create or destroy trust when interpreting nonverbal cues such as the distance between two speakers, a bow of the head, and a handshake, said Hannes Vilhjalmsson, technical director of the project. "There is a whole sequence of things that has to happen in connection with what you are saying, and it's that kind of rich context of interaction that we are trying to re-create in the virtual environment," he said. Many soldiers in Iraq lack international experience, and could easily make cultural gaffes that could lead to problems. Vilhjalmsson is encouraged by the favorable response to the program, and sees bright prospects for both the software itself and interactive learning applications in general. Noting that books fail to convey important cultural nuances, Vilhjalmsson said that the medium of a computer game is perfectly suited for training young soldiers. "This is something they relate to," he noted.
Click Here to View Full Article
to the top


Systems Let Families Monitor Loved Ones
Myrtle Beach Sun News (SC) (04/10/06) Scharnber, Kirsten

Academic and commercial groups continue to research technology and innovate on ideas that would allow the parents of the baby boom generation to live at home as they grow older. Memory-aid systems, which would help seniors remember things they did during the day by producing instant digital photos of themselves, have been the focus of computer engineers at the Georgia Institute of Technology. Researchers at Washington University are incorporating artificial intelligence in a handheld GPS device that would be able to predict where an elderly person is trying to go, and use oral prompts and directional instructions to help guide the individual to their destination. Smart floors that can sense a senior citizen has fallen and summon emergency help are available through home builders in Florida. And the assisted living facility Oatfield Estates in the Portland, Ore., area has deployed sensors throughout the buildings and grounds of its community, and has outfitted residents with intelligent badges. Its beds take weight readings throughout the day, analyze sleeping patterns, and can instantly alert a staffer to assist a "fall risk" resident who is trying to get out of bed. Family members in other parts of the country can monitor their elderly parents and gain their vital signs in real time throughout the day from a secure Web site.
Click Here to View Full Article
to the top


Beware the Smart Virus
Byte and Switch (04/07/06) Rogers, James

Attendees at this week's Storage Networking World conference warned of a new kind of smart virus based on advanced mathematical theory that could disrupt storage networks and servers. "It's not far-fetched," said Interval International CIO Sasan Hamidi, who noted that researchers are already able "to create a living computer program and let it have intelligence." With that capability, a smart virus could mutate itself to get around patches and other security measures. Hamidi claimed that hackers could author the viruses based on cellular automation or game theory, among other scientific foundations. Evolutionary computing could lead to a threat that differs from traditional worms and viruses in its ability to alter its own code once detected and redirect the attack to another part of the network. "The code adapts itself to the environment," said Hamidi. This could be a worm that learns from the environment and becomes more intelligent." Since storage and many other computer resources are now IP-based, an evolutionary computing virus could wreak havoc on an organization after entering through a system's TCP packets. IT managers at the convention agreed that few people have the expertise in genetic algorithms to pull off an evolutionary computing attack, though they identified the 1988 Great Worm attack that brought down much of the Internet as an example. However, Hamidi argued that the industry's current lack of preparedness against such an attack is troubling. Even though most hackers currently lack the knowledge of advanced scientific theory to execute such an attack, the attendees grudgingly admitted that it is only a matter of time before the theoretical possibility of an evolutionary computing attack becomes a reality.
Click Here to View Full Article
to the top


DRM Key to Linux's Consumer Success?
ZDNet (04/07/06) Marson, Ingrid

If Linux does not develop support for copyright protection applications, it could be cut out of the consumer market, warns Jeff Ayars of RealNetworks. "The consequences of Linux not supporting DRM would be that fixed-purpose consumer electronics and Windows PCs would be the sole entertainment platforms available," Ayars says. "Linux would be further relegated to use in servers and business computers, since it would not be providing the multimedia technologies demanded by consumers." The Free Software Foundation counters that consumers have clearly shown that they oppose any form of DRM, and that they want unrestricted use of their digital media. Speaking at LinuxWorld in Boston last week, Ayars noted that with Microsoft Vista incorporating numerous digital rights applications, such as Protected Media Path and Protected User Mode Audio, Linux risks marginalizing itself if it does not follow suit. The recent controversy stemming from Sony's use of rootkits on millions of CDs illustrates why consumers reject DRM and why DRM has no viable business model, argued Free Software Foundation Europe President Georg Greve, noting that Apple's iTunes and eMusic.com offer consumers unrestricted control over content, and both are far more popular than any DRM technology. "So fortunately, it is up to the consumer to decide what the consumer wants. And its answer is clear: It does not want DRM!" Greve said. Ayars allowed that embracing DRM could stifle the kind of innovation that led to the Linux-based TiVo, but commercial vendors such as Red Hat and Novell are more likely to see the business value in applications that allow consumers to access DRM-protected media. Linspire CTO Tom Welch concurred, and said his company would be open to supporting DRM.
Click Here to View Full Article
to the top


IT's Input on Outsourcing
InfoWorld (04/07/06) Fox, Steve

Though many IT professionals have grown to think of the words "outsourcing" and "offshoring" as polite euphemisms for layoffs, they must take an active role in the business discussions that determine whether and how companies look to alternative sources of labor, writes Steve Fox. Executives can be easily enticed by the cost savings of business process outsourcing (BPO), but real challenges arise when deciding which software development projects are to be farmed out, and how those projects are to be integrated into the remaining technology operations. Business leaders are increasingly giving IT workers a seat at the table to help with these decisions. "To make the whole BPO process work, business units need IT involvement," says Leon Erlanger, author of "Putting IT in the Director's Chair." "Outsourcing requires much more than simply giving the process to someone else and hoping they handle it for you the way you would want them to." Erlanger argues that instead of protesting the inevitable growth of outsourcing, IT workers should actively seek involvement in the management of the process. If IT workers can demonstrate the ability to develop, implement, and supervise outsourcing programs that add value to the business, their own stock will rise. In response to concerns that outsourcing takes jobs away from U.S. workers, a recent Association for Computing Machinery (ACM) study has found that outsourcing actually drives innovation and creates new jobs. ACM advises workers to keep their education and skill sets current, improve their communication skills, and develop a working knowledge of global software systems. The ACM report, "Globalization and Offshoring of Software," is available at http://www.acm.org/globalizationreport/.
Click Here to View Full Article
to the top


The Power in the Cloud
InternetNews.com (04/11/06) Hickins, Michael

The introduction of an on-demand customer relationship management (CRM) product this year by SAP is a sign that the software-as-a-service (SaaS) application software model has staying power. However, most industry experts believe SaaS will be limited to making gains among small and medium-sized businesses, and with point applications such as CRM, supply chain management, and product lifecycle management (PLM). Michael Topolovac, CEO of on-demand PLM provider Arena Solutions, is more optimistic about SaaS' potential to gain significantly on the on-premise licensing model as a strategy for delivering software and for how people use technology. "Customers will continue to have on-premise for a number of years still, not because it solves problems better, but because of the cost of replacing legacy systems," says Topolovac. And JMP Securities expects SaaS to become more of a factor in other areas such as ERP, and forecasts it will account for 48 percent of the on-demand market by 2009, compared with 3 percent today. SaaS has its strengths in that software can be easily installed, users can get up and running quickly without having to pay a large up-front fee, customers can easily and frequently upgrade, and companies have better support. However, SaaS does not measure up to license-and-install software when it comes to customization, bandwidth demand, performance, and long-term cost.
Click Here to View Full Article
to the top


The Worried Executive's Guide: Disaster Recovery Planning for Mixed-Hardware Environments
InformIT (04/07/06) Wrobel, Leo

Protecting a company's computer and data assets is no longer simply about protecting corporate networks at the office because data these days extends onto mobile devices, such as laptops and PDAs. This evolving computer web likely will extend into cell phones soon, opines Leo Wrobel, and one important aspect of mobile technology is how much more vulnerable mobile technology is to physical theft compared to ensconced corporate data centers and server rooms. Companies can use security-minded operating systems to protect mobile data, and thwart data theft from a laptop that may have been taken for its market resale value. This is especially crucial for financial companies and others dealing with sensitive client information, because data theft can lead to bad publicity, and much worse. When a company is configuring how to protect itself, it should consider standardizing the type of programs used. This is easier to control and secure, and a company could standardize employee options into as little as three basic packages. Knowledge workers such as writers, lawyers, Web designers, and managers will need a flexible and diverse set of tools to accomplish their jobs, and they likely will use these tools often. In contrast, production workers such as call center operators, help desk employees, and telemarketers all can use standardized computing tools in a more limited array to accomplish their crucial revenue-generating tasks.
Click Here to View Full Article
to the top


Pirates See Days of Yore
Washington Times (04/07/06) P. C10; Bacchus, Joe

Researchers at the University of Maryland at College Park believe they have developed new technology that will discourage people from using collusion attacks to steal copies of CDs, DVDs, or software. A collusion attack involves a number of people copying multiple versions of the same piece of digital media to weaken electronic watermarks embedded in the file and wash away the trace from the original file. The digital fingerprinting technology, developed by K.J. Ray Liu, a professor of electrical and computer engineering, and colleagues at the Institute for Systems Research, makes use of codes that will leave a unique impression on every illegal copy. The strategy would deter people from taking the collusion approach to making illegal copies of digital media because more than 100 pirates would have to work together to make a collusion-resistant fingerprint on a file untraceable. Moreover, the unique fingerprint would enable investigators to trace the crime. According to the researchers, the digital fingerprinting technology would not negatively impact the quality of audio or video, the speed of a computer, or download unwanted programs. Patents are pending on the technology, which is the subject of the book "Multimedia Fingerprinting Forensics for Traitor Tracing."
Click Here to View Full Article - Web Link May Require Free Registration
to the top


Replacing Woodshop
Government Technology (04/01/06) Vol. 19, No. 4, P. 32; Opsahl, Andy

Students can be better prepared to fill much-needed technical positions through efforts such as Project Lead the Way (PLTW), a nonprofit that offers free industry-driven education curricula to high schools in order to address an projected lack of manpower in the U.S. technology and engineering industries. PLTW offers a four-year series of high-school courses in preparation for college, with concentrations in engineering design, digital electronics, engineering principles, computer integrated manufacturing, and civil engineering and architecture. Courses are updated at least once every two years, and are assessed by technology professors and CEOs who advise PLTW on what the industry requires of future job applicants. The organization brings its curricula into line with math and science standards established by the International Technology Education Association. Mark Seiler with the Technology Education Department of Mankato, Minn.'s East Senior High School attributes the high attrition rates of technology and engineering schools to students who drop out after realizing they do not have the training to fulfill their rigorous math requirement; he says the PLTW courses direct students to engineering technology-related fields that are more closely aligned with their strengths. Implementing the PLTW curricula, unlike the curricula itself, costs money: Mankato Area Public Schools career education coordinator Barb Embacher estimates that training for teachers, robotics equipment, and fast computers with high-tech software could amount to about $100,000 over five years. PLTW officials are finding it difficult to fulfill their commitment to establishing 25 percent female enrollment in participating schools' tech-ed programs, due to girls' tendency to frown on math and science if they do not perceive those fields as beneficial to the world at large.
Click Here to View Full Article
to the top


Unwanted Electronics
Electronic Business (04/06) Vol. 32, No. 4, P. S-6; Harbert, Tam

Electronic waste is a growing problem: The EPA reckons that Americans have roughly 500 million obsolete, broken, or otherwise unused mobile phones and are adding about 130 million annually, while the Government Accountability Office (GAO) estimates that over 100 million TVs, computers, and monitors become obsolete each year. Some state and local regulators are not waiting for a resolution to the industry debate over who has responsibility for end-of-life products, and are instituting or planning to institute their own e-waste disposal and recycling directives; the end result could be a crazy-quilt of state and municipal regulation, which the electronics industry is opposed to. "Barring a federal approach, we'd like to see a regional approach," says Richard Goss with the Electronic Industries Alliance. Companies generally support one of two e-waste reclamation strategies in which the consumer foots the bill: Some prefer that consumers pay a "take-back" fee to return products to the manufacturer for recycling or disposal, while others would like consumers to pay a recycling fee up front when they purchase the product. Advocates of the first strategy claim the take-back method creates an incentive for manufacturers to design greener and more recyclable products, while those who favor the second approach argue that an up-front fee helps raise consumer awareness of recycling and offers a way to fund the disposal of "orphan systems." Product end of life was barely a blip on electronics manufacturers' radar screens until Asian and European governments started passing bills that made manufacturers accountable, while the revelation that some underhanded U.S. recyclers and dealers were exporting electronic cast-offs for overseas disposal in less than sanitary conditions added fuel to the fire. Though Congress has started to pay more attention to e-waste disposal and recycling, there is little hope that national legislation will be passed in the near future.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


W3C Launches Incubator
Software Development Times (04/01/06)No. 147, P. 14; Patrizio, Andy

The W3C has begun its Incubator Activity, an initiative to spur the development of Web technologies that might not require the lengthy approval process of a full W3C Recommendation Track working group. The Incubator group might be able to begin work in a matter of weeks, as it is only required to secure the approval of three W3C members, said W3C CEO Steve Bratt. The Incubator group will enjoy the same benefits as a formal working group, including access to the W3C Web site, mailing lists, and publications. Though the working group process is successful, Bratt believes that low-end projects need some kind of review as well. "Imagine if the W3C just threw XML or SOAP and WSDL out there without testing? We're all about building consensus for these foundation technologies," he said. Many vertical applications and other projects never receive a full recommendation because they do not require it, while other projects are simply rejected. Once an Incubator project nears conclusion, the developers immediately begin looking for a more formal testing group. The W3C Content Label Incubator Group will be the first of the new development model, charged with finding a method for making trusted assertions with a label that can be automatically tested.
Click Here to View Full Article
to the top


Let the Internet Be the Internet
Issues in Science and Technology (04/06) Vol. 22, No. 3, P. 36; Nelson, Michael R.

The Internet Society's Michael R. Nelson warns that the creativity of the Internet could be stunted if a top-down bureaucracy regulated by government is imposed. He draws a direct link between the Internet's rapid growth and its ability to maximize its openness and flexibility to individual users while retaining its end-to-end nature: "Because there are competing groups with competing solutions to users' problems, users, vendors, and providers get to determine how the Internet evolves," Nelson explains. Users are the prime movers in the Internet governance model because there are so many actors, often in direct competition with each other; in addition, the vast number of players precludes the accommodation of all critical Internet issues by a single organization, while most international issues are handled by nongovernmental and sometimes competing entities. Some governments would like cyberthreats and other hot-button issues to be addressed through universal, one-size-fits-all solutions, but Nelson maintains that this would "freeze in" current technological fixes and stifle the development of better tools and applications. Worse still, governments could employ measures proposed to deal with cyberthreats to restrict citizens' access to controversial material. Last year's U.N. World Summit on the Information Society focused on the management of domain names by the International Corporation for Assigned Names and Numbers (ICANN); some governments called for ICANN's replacement by an intergovernmental agency, or more government influence in ICANN decision-making. If such proposals gain overwhelming favor in the Internet Governance Forum, there will likely be more calls for greater government oversight in a wide spectrum of Internet issues, Nelson reasons. Yet there are far more pressing issues that the existing Internet governance structure could address. "Rather than discarding what has proven successful, world leaders should be trying to understand how it has succeeded, explaining this process to stakeholders and the public so they can be more effective in participating in the process, and using the lessons of the past in approaching new problems," the author argues.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2006 Information, Inc.


© 2006 ACM, Inc. All rights reserved. ACM Privacy Policy.